¶ºÒõ¹Ý

Data Security 08-19-2014

3 Most Common Social Engineering Threats to Enterprise Data Security

Flavio

Social engineering can bypass anyÌýenterprise data security defense. No amount of software or hardware can prevent unsuspecting and uninformedÌýusers with access to systems and services.

When one puts their faith and confidence in a person who ultimately has access to our computers and security systems, we set ourselves up to be exploited. We may have the very best in security measures, but human psychology is something we can’t protect ourselves against with just software or hardware. Social engineering protection requiresÌýeducation and insight.

What Exactly Is Social Engineering?

Social engineering is the psychological manipulation of people’s minds in an attempt to influence them into divulging confidential information. An attacker will work diligently to gain the user’s confidence in order to gain access to information or to a system, and they do this by providing false information.

Human Social Engineering Attacks to Enterprise Data Security

Human-based enterprise data attacks involve interaction between two people in order to obtain sensitiveÌýinformation or are malicious acts performed in the enterprise.

The human side of social engineering preys on a person’s natural tendency to be helpful and considerate. Once the attacker has gained the user’s confidence, the groundwork has been laid for the attacker to obtain all kinds of information, from eavesdropping and collecting personal information, to impersonating authenticated users and breaking general business practices.

  1. Authority-Based Attacks

    The attacker poses as a high-authority figure and uses this status to request access to computer files and other data. The social engineer overpowers employees with their superiority in an effort to gain access to log in information and the employee feels they have no choice but to provide the high-authority figure with the information requested. They may fear losing their job or at least a verbal complaint being made against them.

  2. Impersonating an Authenticated User

    With this kind of attack, the perpetrator acts as a valid user of the system or an employee. As such the attacker is able to gain valuable data from desktops, trashcans, and PC systems. The attacker may pose as a help desk employee, a contractor, technical support, or other third party in order to gain easy access to the information they are seeking.

    Attackers could also pose as a valid authorized person with full access to a systems or information that is not available to them for some reason.ÌýThe attacker (social engineer) poses as the authorized person and encourages the 3rd party to share sensitive details or enable them to invade the system, accessing data or circumventing business processes.

  3. Technical Support Attacks

    In this instance, the attacker poses as a technical support professional and attempts to obtain information via a phone call. The social engineer explains the need for access to log in information in order to troubleshoot network problems in the office computers. Unfortunately, when confronted with this request, an uneducated or unsure staff member might provide the attacker with this information.

3 Easy Tips to ProtectÌýEnterprise Users Against Social Engineering

Protecting users against social engineering means enhancing technology and policies along with effective user education.

  1. Create Effective Security Policy Training

    Most security policies are documents hidden from the typical enterprise users. It might be a document signed on the first day on the job and then rarely discussed again. Educating users on security practices needs to be more than a step in employee orientation or a once a year checklist item.

    Effective security training need to be frequent, focused, and brief. Rather than being an afterthought, administrators can schedule mini sessions, online modules, or even quick quizzes and games for users on a regular basis where topics are easy to understand and remember and short enough for users to fit into their busy schedules.

  2. Use Real LifeÌýLessons

    Pointing out real life cases of social engineering and social engineering in the news can help increase user awareness of the threat that the attack poses to enterprise data. If users are notified of attempts or attacks in the news, it will make them more apt to recognize the signs of a social engineering attack when it happens to them.

  3. Implement Multi-Factor Authentication for PeopleÌýand Processes

    As users are educated on the signs of social engineering attacks and learn to recognize them, it's critical that enterprise administrators support users with the right processes toÌýprotect data when user training and awareness breaks down. Adding layers of protection to enterprise dataÌýsecurity can ensure that information stays safe even when some of the elements of security policy break down.

    Ìýis one key to helping enterprises keep information out of the hands of bad actors. Administrators can useÌýmulti-factor authentication to addÌýrestrictions in order to access the most sensitive data on network resources. If network userÌýcan access a system, but the system requires verifiedÌýusersÌýto have a token or certificate to access data, enterprises remains safe—even from social engineering attacks.

    In addition to multiple security layers, adding peopleÌýlayers improves data protection. By requiring multiple users to perform the most critical system tasks or requiring multiple user verifications to access ultra sensitive information, enterprises can make social engineering more difficult in their organization.

Security Is Everyone’s Responsibility

As administrators leverage existing technology along with user education and best practices, they can protect the enterprise and sensitive data from social engineering attacks.ÌýHowever, every user is responsible for security best practices. There needs to be a shift in the enterprise mindset of data security being an IT initiative to protecting the enterprise from social engineeringÌýbecoming part of every user's day-to-day responsibility.

UP NEXT
PKI

3 Surprising Uses of PKI in Big Companies and How to Ensure They Are all Secure

5 Min

Featured Stories

12-04-2024

How artificial intelligence is reshaping digital trust

12-18-2024

Announcing the new open-source DCV library from ¶ºÒõ¹Ý

How to spot a fraudulent website